Ethical hacking tools and resources for penetration testing and red team operations.
Explore 276 curated tools and resources
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.
A cloud-native web application and API security solution that uses contextual AI to protect against known and zero-day threats without signature-based detection.
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
A modular, menu-driven tool for building repeatable, time-delayed, distributed security events.
A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.
A modern post-exploitation command and control framework with a client-server architecture and extensibility features.
Create a vulnerable active directory for testing various Active Directory attacks.
Python-based toolkit for network hacking with various implemented techniques and supported by Securetia SRL.
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.
Caldera is a cybersecurity framework by MITRE for automated security assessments and adversary emulation.
Very vulnerable ARM/ARM64[AARCH64] application with various levels of vulnerabilities for exploitation training.
A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.
DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.
A distributed systems and infrastructure simulator for attacking and debugging Kubernetes.
A technique for social engineering and untrusted command execution using ClickOnce technology
AEM (Adobe Experience Manager) Hacker is a tool designed to help security researchers and penetration testers identify and exploit vulnerabilities in AEM-based systems.
Interactive online malware sandbox for real-time analysis and threat intelligence